Shared Flashcard Set

Details

CIS 110
Mid Term Study Guide
50
Computer Networking
Undergraduate 1
04/29/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Access Rights
Definition
An access right is a right granted to a user for a particular entity instance.
Term
Adware
Definition
A software program that delivers advertising content in a matter that is unexpected or unwanted by the user.
Term
ARP
Definition
Part of TCP/IP for determining the MAC based on IP.
Term
Asset
Definition
An item that has value.
Term
Availability
Definition
Security actions that ensure that data is accessible to authorized users.
Term
Bot Herder
Definition
An attacker that gains control of a system unknowingly to the user called a zombie. They then carry out attacks using multiple zombies.
Term
Cable Lock
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
Term
Cipher Lock
Definition
A combination lock that uses buttons which must be pushed in the proper sequence to open the door.
Term
Client-side Attack
Definition
An attack that targets vulnerabilities in client applications that interact with a compromised server or processes malicious data.
Term
Companion Virus
Definition
Adds a program to the OS that is a malicious copycat version of legitimate program.
Term
Spy (Computer)
Definition
A person that is hired to break into a computer and steal information.
Term
Confidentiality
Definition
Security actions that ensure only authorized parties can view information.
Term
Cyber-terrorism
Definition
A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence.
Term
Diversity
Definition
Apart of layering security, diversity is to have multiple non redundant forms of security.
Term
DNS
Definition
Domain name server. Resolves host names by their IP address.
Term
Exploit
Definition
A vulnerability in a system software, hardware.
Term
Firewall
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving a computer or network.
Term
First-Party Cookie
Definition
A cookie that is created from the website that is currently being view.
Term
Hoax
Definition
A false warning.
Term
Honeypot
Definition
A computer located in an area with limited security loaded with software and data that appears to be real to trick attackers into revealing their techniques.
Term
Identity Theft
Definition
Stealing another persons personal info like SSN and using it to impersonate them for financial gain.
Term
Integrity
Definition
A security action that ensures that info is correct and no unauthorized person or software has altered the data.
Term
Layering
Definition
Provides multiple lines of defense against attackers.
Term
Limiting
Definition
Limits access to data to reduce the risk of it being compromised.
Term
Logic Bomb
Definition
An attack that lies dormant until an event triggers it.
Term
Macro
Definition
A series of instructions that can be grouped together as a single command.
Term
Man-in-the-middle Attack
Definition
An attack that intercepts legit data and forges a fictitious response to the sender.
Term
Mantrap
Definition
A device that monitors and controls two interlocking doors to a small room designed to separate secure and non-secure data.
Term
Obscurity
Definition
Keeping system info secure from outside sources who don't need to know the info.
Term
Phishing
Definition
A website or email that claims to be legitimate and asks unsuspecting users for sensitive data to be used against them.
Term
Phreaking
Definition
The action of hacking into telecommunications systems, esp. to obtain free calls.
Term
Privilege Escalation
Definition
An attack that exploits a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining.
Term
Procedures
Definition
A predetermined set of rules to fallow in certain situations.
Term
Proximity Reader
Definition
A device that detects an emitted signal to id the owner.
Term
RFID
Definition
Radio frequency id's read by proxy readers usually in id badges.
Term
Risk
Definition
The likelihood that a threat agent will exploit the vulnerability.
Term
Rootkit
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
Term
Service Pack
Definition
Software that is a cumulative package of all security updates plus additional features.
Term
Social Engineering
Definition
A means of gathering information for an attack by relying on the weaknesses of individuals.
Term
Spam
Definition
Unsolicited email.
Term
Spyware
Definition
A general term used to describe software that is used to spy on users and gather info w/o consent, thus violating their privacy.
Term
SQL Injection Attack
Definition
An attack that targets SQL servers by injecting commands to be manipulated by the db.
Term
Third-Party Cookie
Definition
A cookie created by a 3rd party that is different from the primary website.
Term
Threat
Definition
A type of action that has the potential to cause harm.
Term
Threat Agent
Definition
A person or agent that has the power to carry out a threat.
Term
Trojan
Definition
An exe advertised as performing one activity but actually does something else.
Term
Virus
Definition
Code that reproduces itself.
Term
Vulnerability
Definition
A flaw or weakness that allows a threat agent to bypass security.
Term
Worm
Definition
An app that takes advantage of a vulnerability in an app or OS in order to self replicate.
Term
Zero-day Attack
Definition
Attacks that exploit previously unknown vulnerabilities so victims have no time to prepare or defend against them.
Supporting users have an ad free experience!